0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (322)
  • R250 - R500 (918)
  • R500+ (16,249)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

The Art of Invisibility - The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data... The Art of Invisibility - The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data (Paperback)
Kevin D. Mitnick, Robert Vamosi; Foreword by Mikko Hypponen 1
R534 R429 Discovery Miles 4 290 Save R105 (20%) Ships in 10 - 15 working days

Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. In THE ART OF INVISIBILITY Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.

Mobile Cloud Computing - Models, Implementation, and Security (Paperback): Meikang Qiu, Keke Gai Mobile Cloud Computing - Models, Implementation, and Security (Paperback)
Meikang Qiu, Keke Gai
R1,454 Discovery Miles 14 540 Ships in 12 - 17 working days

Mobile Cloud Computing: Models, Implementation, and Security provides a comprehensive introduction to mobile cloud computing, including key concepts, models, and relevant applications. The book focuses on novel and advanced algorithms, as well as mobile app development. The book begins with an overview of mobile cloud computing concepts, models, and service deployments, as well as specific cloud service models. It continues with the basic mechanisms and principles of mobile computing, as well as virtualization techniques. The book also introduces mobile cloud computing architecture, design, key techniques, and challenges. The second part of the book covers optimizations of data processing and storage in mobile clouds, including performance and green clouds. The crucial optimization algorithm in mobile cloud computing is also explored, along with big data and service computing. Security issues in mobile cloud computing are covered in-depth, including a brief introduction to security and privacy issues and threats, as well as privacy protection techniques in mobile systems. The last part of the book features the integration of service-oriented architecture with mobile cloud computing. It discusses web service specifications related to implementations of mobile cloud computing. The book not only presents critical concepts in mobile cloud systems, but also drives readers to deeper research, through open discussion questions. Practical case studies are also included. Suitable for graduate students and professionals, this book provides a detailed and timely overview of mobile cloud computing for a broad range of readers.

Building the Network of the Future - Getting Smarter, Faster, and More Flexible with a Software Centric Approach (Paperback):... Building the Network of the Future - Getting Smarter, Faster, and More Flexible with a Software Centric Approach (Paperback)
John Donovan, Krish Prabhu
R1,471 Discovery Miles 14 710 Ships in 12 - 17 working days

From the Foreword: "This book lays out much of what we've learned at AT&T about SDN and NFV. Some of the smartest network experts in the industry have drawn a map to help you navigate this journey. Their goal isn't to predict the future but to help you design and build a network that will be ready for whatever that future holds. Because if there's one thing the last decade has taught us, it's that network demand will always exceed expectations. This book will help you get ready." -Randall Stephenson, Chairman, CEO, and President of AT&T "Software is changing the world, and networks too. In this in-depth book, AT&T's top networking experts discuss how they're moving software-defined networking from concept to practice, and why it's a business imperative to do this rapidly." -Urs Hoelzle, SVP Cloud Infrastructure, Google "Telecom operators face a continuous challenge for more agility to serve their customers with a better customer experience and a lower cost. This book is a very inspiring and vivid testimony of the huge transformation this means, not only for the networks but for the entire companies, and how AT&T is leading it. It provides a lot of very deep insights about the technical challenges telecom engineers are facing today. Beyond AT&T, I'm sure this book will be extremely helpful to the whole industry." -Alain Maloberti, Group Chief Network Officer, Orange Labs Networks "This new book should be read by any organization faced with a future driven by a "shift to software." It is a holistic view of how AT&T has transformed its core infrastructure from hardware based to largely software based to lower costs and speed innovation. To do so, AT&T had to redefine their technology supply chain, retrain their workforce, and move toward open source user-driven innovation; all while managing one of the biggest networks in the world. It is an amazing feat that will put AT&T in a leading position for years to come." -Jim Zemlin, Executive Director, The Linux Foundation This book is based on the lessons learned from AT&T's software transformation journey starting in 2012 when rampant traffic growth necessitated a change in network architecture and design. Using new technologies such as NFV, SDN, Cloud, and Big Data, AT&T's engineers outlined and implemented a radical network transformation program that dramatically reduced capital and operating expenditures. This book describes the transformation in substantial detail. The subject matter is of great interest to telecom professionals worldwide, as well as academic researchers looking to apply the latest techniques in computer science to solving telecom's big problems around scalability, resilience, and survivability.

Communicating Artificial Intelligence (AI) - Theory, Research, and Practice (Hardcover): Seungahn Nah, Jang Hyun Kim, Jungseock... Communicating Artificial Intelligence (AI) - Theory, Research, and Practice (Hardcover)
Seungahn Nah, Jang Hyun Kim, Jungseock Joo, Jasmine E. McNealy
R4,130 Discovery Miles 41 300 Ships in 12 - 17 working days

Despite increasing scholarly attention to artificial intelligence (AI), studies at the intersection of AI and communication remain ripe for exploration, including investigations of the social, political, cultural, and ethical aspects of machine intelligence, interactions among agents, and social artifacts. This book tackles these unexplored research areas with special emphasis on conditions, components, and consequences of cognitive, attitudinal, affective, and behavioural dimensions toward communication and AI. In doing so, this book epitomizes communication, journalism and media scholarship on AI and its social, political, cultural, and ethical perspectives. Topics vary widely from interactions between humans and robots through news representation of AI and AI-based news credibility to privacy and value toward AI in the public sphere. Contributors from such countries as Brazil, Netherland, South Korea, Spain, and United States discuss important issues and challenges in AI and communication studies. The collection of chapters in the book considers implications for not only theoretical and methodological approaches, but policymakers and practitioners alike. The chapters in this book were originally published as a special issue of Communication Studies.

Security Risk Models for Cyber Insurance (Hardcover): Caroline Baylon, Jose Vila, David Rios Insua Security Risk Models for Cyber Insurance (Hardcover)
Caroline Baylon, Jose Vila, David Rios Insua
R3,685 Discovery Miles 36 850 Ships in 12 - 17 working days

Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude-and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution - based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts - but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).

Handbook on Mobile and Ubiquitous Computing - Status and Perspective (Hardcover, New): Laurence T. Yang, Evi Syukur, Seng W Loke Handbook on Mobile and Ubiquitous Computing - Status and Perspective (Hardcover, New)
Laurence T. Yang, Evi Syukur, Seng W Loke
R4,664 Discovery Miles 46 640 Ships in 12 - 17 working days

Consolidating recent research in the area, the Handbook on Mobile and Ubiquitous Computing: Status and Perspective illustrates the design, implementation, and deployment of mobile and ubiquitous systems, particularly in mobile and ubiquitous environments, modeling, database components, and wireless infrastructures.
Supplying an overarching perspective, the book is ideal for researchers, graduate students, and industry practitioners in computer science and engineering interested in recent developments in mobile and ubiquitous computing. It discusses new trends in intelligent systems, reviews sensory input and multimedia information, and examines embedded real-time systems. With coverage that spans security, privacy, and trust, the book is divided into six parts:

  1. Mobile and Ubiquitous Computing-illustrates the concepts, design, implementation, and deployment of mobile and ubiquitous systems
  2. Smart Environments and Agent Systems-discusses a new trend toward intelligent systems that are completely connected, proactive, intuitive, and constantly available
  3. Human-Computer Interaction and Multimedia Computing-describes guidelines for designing multisensory input and output for mobile devices
  4. Security, Privacy, and Trust Management-presents an approach to dynamically establish trust between a system and its mobile client in a flexible manner using a multi-agent negotiation mechanism
  5. Embedded Real-Time Systems-introduces novel work on how mobile, ubiquitous, and intelligence computing can be realized
  6. Networking Sensing and Communications-covers challenges, designs, and prototype solutions for establishing, managing, and maintaining current sensor networks in mobile and ubiquitous computing environments

Containing the contributions of more than 70 researchers, practitioners, and academics from around the world, the book brings together the latest research on the subject to provide an understanding of the issues being addressed in the field. Filled with extensive references in each chapter, it provides you with the tools to participate in the design, implementation, and deployment of systems that are connected, proactive, intuitive, and constantly available.

Microsoft Azure Compute - The Definitive Guide (Paperback): Avinash Valiramani Microsoft Azure Compute - The Definitive Guide (Paperback)
Avinash Valiramani
R805 Discovery Miles 8 050 Ships in 12 - 17 working days

Proven best practices for success with every Azure compute service! Compute services are key to most Azure cloud solutions, but maximizing their value requires best-practice planning, design, deployment, and operations. Now, leading consultant Avinash Valiramani presents expert guidance for driving maximum value from Microsoft's portfolio of Azure compute services for IaaS, PaaS, and FaaS. Drawing on his extensive work with Microsoft's Azure teams, he covers Azure VMs, VM Scale Sets, App Services, Azure Virtual Desktops, Azure Container Instances, Azure Functions, Azure Batch, and other Compute services. Whatever your role in delivering efficient, scalable compute services, this deep dive will help you make the most of your Azure investment. Leading Azure consultant Avinash Valiramani shows how to: Dive deeply into the frequently used Azure Compute services to better understand how each service works Walk through configuring each compute service and its related features and options Size, price, and create Azure VMs, and deliver the right levels of redundancy and availability Use VM Scale Sets (VMSS) to integrate VMs with load balancing and autoscaling Host web applications, mobile app back ends, and REST APIs via Azure App Service Run desktops-as-a-service at scale with Azure Virtual Desktop (AVD) Easily deploy containers on demand with Azure Container Instances (ACIs) Use serverless Azure Functions to build web APIs, process streams, and manage message queues About this Book For everyone interested in Azure infrastructure, including IT/cloud admins, security specialists, developers, engineers, and others at all levels of Azure compute experience. Especially useful for experienced IT pros in mid-sized to large organizations who have deployed, operated, monitored, upgraded, migrated, or designed infrastructure services.

Policing Global Movement - Tourism, Migration, Human Trafficking, and Terrorism (Hardcover, New): S. Caroline Taylor, Daniel... Policing Global Movement - Tourism, Migration, Human Trafficking, and Terrorism (Hardcover, New)
S. Caroline Taylor, Daniel Joseph Torpy, Dilip K Das
R3,255 Discovery Miles 32 550 Ships in 12 - 17 working days

The movement of humans across borders is increasing exponentially-some for benign reasons, others nefarious, including terrorism, human trafficking, and people smuggling. Consequently, the policing of human movement within and across borders has been and remains a significant concern to nations. Policing Global Movement: Tourism, Migration, Human Trafficking, and Terrorism explores the nature of these challenges for police, governments, and citizens at large.

Drawn from keynote and paper presentations at a recent International Police Executive Symposium meeting in Malta, the book presents the work of scholars and practitioners who analyze a variety of topics on the cutting edge of global policing, including:

  • Western attempts to reform the policing of sex tourists in the Philippines and Gambia
  • Policing the flow of people and goods in the port of Rotterdam
  • Policing protestors and what happened at the 2010 G20 Summit in Toronto
  • Mexico's use of the military in its war against drug trafficking
  • Public-private cooperation in the fight against organized crime and terrorism in Australia
  • Recommendations for police reform in Afghanistan
  • Sweden's national counterterrorism unit
  • Treatment of asylum seekers in a privately run detention center in South Africa
  • The policing of human trafficking for the sex trade in sub-Saharan Africa, Vietnam, Australia, and Andhra Pradesh, India

Examining areas of increasing concern to governments and citizens around the world, this timely volume presents critical international perspectives on these ongoing global challenges that threaten the safety of humans worldwide.

The Promised Land? - The Lives and Voices of Hispanic Immigrants in the New South (Paperback): Patricia L Goerman The Promised Land? - The Lives and Voices of Hispanic Immigrants in the New South (Paperback)
Patricia L Goerman
R1,281 Discovery Miles 12 810 Ships in 12 - 17 working days

Through analysis of in-depth interviews with seventy-three Hispanic immigrants in Central Virginia, this book offers a rare in-depth look at the views and circumstances of immigrants in a new receiving area. It provides an examination of the new migration trend including an analysis of immigrants' living and working conditions, their family life, and their plans for the future.

Wireless Sensor Networks - A Cognitive Perspective (Hardcover, New): Mohamed Ibnkahla Wireless Sensor Networks - A Cognitive Perspective (Hardcover, New)
Mohamed Ibnkahla
R5,946 Discovery Miles 59 460 Ships in 12 - 17 working days

With classical techniques for data transmission soon reaching their limitations, cognitive approaches may offer a solution to user requirements for better coverage, connectivity, security, and energy efficiency at lower cost. Wireless Sensor Networks: A Cognitive Perspective presents a unified view of the state of the art of cognitive approaches in telecommunications. A benchmark in the field, it brings together research that has previously been scattered throughout conference and journal papers.

Cutting-Edge Topics in Cognitive Communications

After a review of the cognitive concept and approaches, the book outlines a generic architecture for cognition in wireless sensor networks. It then targets specific issues that need to be addressed through cognition, from cognitive radio and spectrum access to routing protocols. The book also explores how to use weighted cognitive maps to improve network lifetime through optimizing routing, medium access, and power control while fulfilling end-to-end goals. The final chapter discusses the implementation of hardware for GPS/INS-enabled wireless sensor networks. This addresses an important need for real-time node position information in many wireless sensor network applications and communication protocols.

Real-World Applications of Wireless Sensor Networks using the Cognitive Concept

Written in a tutorial style, the book supplies an in-depth survey of each topic, accompanied by detailed descriptions of the algorithms and protocols. It also provides a step-by-step analysis of the various communications systems through extensive computer simulations and illustrations. Examples cover environmental monitoring, vehicular communications, tracking, and more. A comprehensive overview of cognitive communications in wireless sensor networks, this work lays the foundations for readers to participate in a new era of research in this emerging field.

Transparenz in globalen Lieferketten der Automobilindustrie Ansatze zur Logistik- und Producktionsoptimierung (German,... Transparenz in globalen Lieferketten der Automobilindustrie Ansatze zur Logistik- und Producktionsoptimierung (German, Hardcover)
R Lepratti
R1,446 R1,195 Discovery Miles 11 950 Save R251 (17%) Out of stock
Cybersecurity Incident Response - How to Contain, Eradicate, and Recover from Incidents (Paperback, 1st ed.): Eric C. Thompson Cybersecurity Incident Response - How to Contain, Eradicate, and Recover from Incidents (Paperback, 1st ed.)
Eric C. Thompson
R1,629 R1,260 Discovery Miles 12 600 Save R369 (23%) Ships in 10 - 15 working days

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving an incident, or a breach, requires the best response possible. This book provides practical guidance for the containment, eradication, and recovery from cybersecurity events and incidents. The book takes the approach that incident response should be a continual program. Leaders must understand the organizational environment, the strengths and weaknesses of the program and team, and how to strategically respond. Successful behaviors and actions required for each phase of incident response are explored in the book. Straight from NIST 800-61, these actions include: Planning and practicing Detection Containment Eradication Post-incident actions What You'll Learn Know the sub-categories of the NIST Cybersecurity Framework Understand the components of incident response Go beyond the incident response plan Turn the plan into a program that needs vision, leadership, and culture to make it successful Be effective in your role on the incident response team Who This Book Is For Cybersecurity leaders, executives, consultants, and entry-level professionals responsible for executing the incident response plan when something goes wrong

Computer Networking: A Top-Down Approach, Global Edition (Paperback, 8th edition): James Kurose, Keith Ross Computer Networking: A Top-Down Approach, Global Edition (Paperback, 8th edition)
James Kurose, Keith Ross
R2,434 R1,938 Discovery Miles 19 380 Save R496 (20%) Ships in 12 - 17 working days

This print textbook is available for students to rent for their classes. The Pearson print rental program provides students with affordable access to learning materials, so they come to class ready to succeed. A top-down, layered approach to computer networking. Unique among computer networking texts, the 8th Edition of the popular Computer Networking: A Top Down Approach builds on the authors' long tradition of teaching this complex subject through a layered approach in a "top-down manner." The text works its way from the application layer down toward the physical layer, motivating students by exposing them to important concepts early in their study of networking. Focusing on the Internet and the fundamentally important issues of networking, this text provides an excellent foundation for students in computer science and electrical engineering, without requiring extensive knowledge of programming or mathematics. The 8th Edition has been updated to reflect the most important and exciting recent advances in networking, including the importance of software-defined networking (SDN) and the rapid adoption of 4G/5G networks and the mobile applications they enable.

The 7 Qualities of Highly Secure Software (Hardcover): Mano Paul The 7 Qualities of Highly Secure Software (Hardcover)
Mano Paul
R1,861 Discovery Miles 18 610 Ships in 12 - 17 working days

The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies-ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and video games-to illustrate the qualities that are essential for the development of highly secure software. Each chapter details one of the seven qualities that can make your software highly secure and less susceptible to hacker threats. Leveraging real-world experiences and examples, the book: Explains complex security concepts in language that is easy to understand for professionals involved in management, software development, and operations Specifies the qualities and skills that are essential for building secure software Highlights the parallels between the habits of effective people and qualities in terms of software security Praise for the Book: This will be required reading for my executives, security team, software architects and lead developers.-David W. Stender, CISSP, CSSLP, CAP, CISO of the US Internal Revenue Service Developing highly secure software should be at the forefront of organizational strategy and this book provides a framework to do so.-Troy Leach, CTO, PCI Security Standards Council This book will teach you the core, critical skills needed to raise the security bar on the attackers and swing the game in your favor.-Michael Howard, Principal Cyber Security Program Manager, Microsoft As a penetration tester, my job will be a lot harder as people read this book! -Kevin Johnson, Security Consultant, Secure Ideas

Information Systems - Debates, Applications and Impacts (Paperback): Priya Seetharaman, Jocelyn Cranefield Information Systems - Debates, Applications and Impacts (Paperback)
Priya Seetharaman, Jocelyn Cranefield
R1,314 Discovery Miles 13 140 Ships in 12 - 17 working days

This book captures a range of important developments that have occurred in Information Systems over the last forty years, with a particular focus on India and the developing world. Over this time, Information and Communications Technology (ICT) and Information Systems (IS) have come to play a critical role in supporting, complementing and automating managerial decisions, shaping and transforming industries, and contributing to deep societal and economic change. This volume examines a range of topics for those interested in the adoption and use of these technologies across varied situations. It combines empirical studies on the application and impact of IS with commentaries, debates and insights on the transformative role that IT and the IT industry have played, and continue to play, within India as well as globally. The book draws attention to issues and challenges that organizations grapple with in tech-enabled environments, and provides insights on the role of automation and computational techniques. It explores the global impact of the technology revolution on economic growth and development, electronic globalization, and the wider opportunities and challenges of a hi-tech world. The chapters cover various themes such as e-government in India, internet-based distribution systems, internet banking, and use of collaborative IT tools and functions to support virtual teams in the software industry and the business process outsourcing industry. Other chapters focus on methodological advances, such as systems thinking which finds applications in organizational decision-making, and the use of fuzzy logic. This volume will interest professionals and scholars of information technology and information systems, computer studies, IT systems, economics, and business and management studies.

Computer, Communication and Electrical Technology - Proceedings of the International Conference on Advancement of Computer... Computer, Communication and Electrical Technology - Proceedings of the International Conference on Advancement of Computer Communication and Electrical Technology (ACCET 2016), West Bengal, India, 21-22 October 2016 (Paperback)
Debatosh Guha, Badal Chakraborty, Himadri Sekhar Dutta
R1,492 Discovery Miles 14 920 Ships in 12 - 17 working days

The First International Conference on Advancement of Computer, Communication and Electrical Technology focuses on key technologies and recent progress in computer vision, information technology applications, VLSI, signal processing, power electronics & drives, and application of sensors & transducers, etc. Topics in this conference include: Computer Science This conference encompassed relevant topics in computer science such as computer vision & intelligent system, networking theory, and application of information technology. Communication EngineeringTo enhance the theory & technology of communication engineering, ACCET 2016 highlighted the state-of the-art research work in the field of VLSI, optical communication, and signal processing of various data formatting. Research work in the field of microwave engineering, cognitive radio and networks are also included. Electrical Technology The state-of-the-art research topic in the field of electrical & instrumentation engineering is included in this conference such as power system stability & protection, non-conventional energy resources, electrical drives, and biomedical engineering. Research work in the area of optimization and application in control, measurement & instrumentation are included as well.

Signal and Information Processing, Networking and Computers - Proceedings of the 1st International Congress on Signal and... Signal and Information Processing, Networking and Computers - Proceedings of the 1st International Congress on Signal and Information Processing, Networking and Computers (ICSINC 2015), October 17-18, 2015 Beijing, China (Paperback)
Na Chen, Ting Ting Huang
R1,497 Discovery Miles 14 970 Ships in 12 - 17 working days

The First International Conference on Signal and Information Processing, Networking and Computers (ICSINC) focuses on the key technologies and challenges of signal and information processing schemes, network application, computer theory and application, etc. Topics in this conference include: Information TheoryThe work contains state-of-the-art research work in the field of information theory from traditional media coding theory, compressing and streaming theory to the latest quantum theory & statistics and big data analytics, featuring the most active research interests in this field. Communication SystemAs a traditional and fundamental aspect of the conference in the field of signal processing and networking, ICSINC publications includes research works focusing on physical layer transmission theory such as MIMO transmission, adaptive antenna theory, and radar and satellite transmission, etc. Research works in the field of SDN, wireless security and 5G related theories are also included. Computer ScienceThe conference also encompasses relevant topics in computer science such as AI & neural network, patter recognition & learning, and medical image processing etc. Other topics such as internet application, biometric & authentication are also included. WorkshopICSINC features workshops hosted by experts from the industrial world. The workshop on Telecom Big Data based Research and Application promotes the in-depth exploration of the most recent research and development findings on the basis of telecom big data. This workshop provides participation of the industry to showcase and commercialize their relevant technology and application as well as products. All materials will be included in publication.

Outlook 2019 For Dummies (Paperback): F. Wempen Outlook 2019 For Dummies (Paperback)
F. Wempen
R777 R615 Discovery Miles 6 150 Save R162 (21%) Ships in 12 - 17 working days

Get up to speed with the world's best email application -- Outlook 2019 Of the millions of people who use Outlook, most only use about two percent of its features. Don't stay in the dark! Outlook 2019 For Dummies shows you how to take advantage of often-overlooked tips and tricks to make it work even better for you. Inside, you'll find information on navigating the user interface; utilizing the To-Do bar; filtering junk email; smart scheduling; RSS support; using electronic business cards; accessing data with two-way sync and offline and cloud based access, and much more! Make the most of Outlook's anti-phishing capabilities Share your calendar Integrate tasks with other Microsoft applications and services Manage email folders If you're upgrading to the latest version -- or have never used this popular email tool -- this book makes it easier than ever to get Outlook working for you.

Incident Response & Computer Forensics, Third Edition (Paperback, 3rd edition): Jason Luttgens, Matthew Pepe, Kevin Mandia Incident Response & Computer Forensics, Third Edition (Paperback, 3rd edition)
Jason Luttgens, Matthew Pepe, Kevin Mandia
R1,787 R1,106 Discovery Miles 11 060 Save R681 (38%) Ships in 12 - 17 working days

"The all-new edition of this security bestseller covers the latest techniques, tools, and case scenarios to help incident responders react quickly and efficiently to data breaches."

"Incident Response and Computer Forensics, Third Edition" is a fully updated edition of the bestselling technical guide that arms you with the right know-how to get your organization out of trouble when data breaches occur.

This new edition is chock-full of updates about tools and techniques as well as new real-world scenarios reflecting today's most common types of incidents. Detailed advice covers all aspects of incident investigation and handling, with an emphasis on forensics--knowing where and how to look into computers for evidence of wrongdoing. New chapters on investigation techniques, indicators of compromise, and remediation New advice on architecting networks from the ground-up to fight intrusions and on streamlining intrusion diagnoses for faster recovery Substantial updates on investigating Windows systems, malware analysis, memory analysis, application analysis, data collection, report writing, and incident management The most relevant tips and tricks for a forensics-forward approach to handling and protecting sensitive data without compromising systems further New and updated information for managers and business leaders to prepare for and manage an incident

Security De-Engineering - Solving the Problems in Information Risk Management (Paperback): Ian Tibble Security De-Engineering - Solving the Problems in Information Risk Management (Paperback)
Ian Tibble
R2,054 Discovery Miles 20 540 Ships in 12 - 17 working days

As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something wrong in information security. Providing a simple foundational remedy for our security ills, Security De-Engineering: Solving the Problems in Information Risk Management is a definitive guide to the current problems impacting corporate information risk management. It explains what the problems are, how and why they have manifested, and outlines powerful solutions.

Ian Tibble delves into more than a decade of experience working with close to 100 different Fortune 500s and multinationals to explain how a gradual erosion of skills has placed corporate information assets on a disastrous collision course with automated malware attacks and manual intrusions. Presenting a complete journal of hacking feats and how corporate networks can be compromised, the book covers the most critical aspects of corporate risk information risk management.

  • Outlines six detrimental security changes that have occurred in the past decade
  • Examines automated vulnerability scanners and rationalizes the differences between their perceived and actual value
  • Considers security products including intrusion detection, security incident event management, and identity management

The book provides a rare glimpse at the untold stories of what goes on behind the closed doors of private corporations. It details the tools and products that are used, typical behavioral traits, and the two types of security experts that have existed since the mid-nineties the hackers and the consultants that came later. Answering some of the most pressing questions about network penetration testing and cloud computing security, this book provides you with the understanding and tools needed to tackle today 's risk management issues as well as those on the horizon.

Cybersecurity for Industrial Control Systems - SCADA, DCS, PLC, HMI, and SIS (Hardcover): Tyson Macaulay, Bryan L. Singer Cybersecurity for Industrial Control Systems - SCADA, DCS, PLC, HMI, and SIS (Hardcover)
Tyson Macaulay, Bryan L. Singer
R2,488 Discovery Miles 24 880 Ships in 12 - 17 working days

As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency.

Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the efficiency and functionality of ICS.
Highlighting the key issues that need to be addressed, the book begins with a thorough introduction to ICS. It discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. Next, it explains why security requirements differ from IT to ICS. It differentiates when standard IT security solutions can be used and where SCADA-specific practices are required.
The book examines the plethora of potential threats to ICS, including hi-jacking malware, botnets, spam engines, and porn dialers. It outlines the range of vulnerabilities inherent in the ICS quest for efficiency and functionality that necessitates risk behavior such as remote access and control of critical equipment. Reviewing risk assessment techniques and the evolving risk assessment process, the text concludes by examining what is on the horizon for ICS security, including IPv6, ICSv6 test lab designs, and IPv6 and ICS sensors.

Data Mining Tools for Malware Detection (Hardcover): Mehedy Masud, Latifur Khan, Bhavani Thuraisingham Data Mining Tools for Malware Detection (Hardcover)
Mehedy Masud, Latifur Khan, Bhavani Thuraisingham
R3,728 Discovery Miles 37 280 Ships in 12 - 17 working days

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware detection. Integrating theory with practical techniques and experimental results, it focuses on malware detection applications for email worms, malicious code, remote exploits, and botnets.

The authors describe the systems they have designed and developed: email worm detection using data mining, a scalable multi-level feature extraction technique to detect malicious executables, detecting remote exploits using data mining, and flow-based identification of botnet traffic by mining multiple log files. For each of these tools, they detail the system architecture, algorithms, performance results, and limitations.

  • Discusses data mining for emerging applications, including adaptable malware detection, insider threat detection, firewall policy analysis, and real-time data mining
  • Includes four appendices that provide a firm foundation in data management, secure systems, and the semantic web
  • Describes the authors tools for stream data mining

From algorithms to experimental results, this is one of the few books that will be equally valuable to those in industry, government, and academia. It will help technologists decide which tools to select for specific applications, managers will learn how to determine whether or not to proceed with a data mining project, and developers will find innovative alternative designs for a range of applications.

ERP Systems for Manufacturing Supply Chains - Applications, Configuration, and Performance (Hardcover): Odd Joran Sagegg,... ERP Systems for Manufacturing Supply Chains - Applications, Configuration, and Performance (Hardcover)
Odd Joran Sagegg, Erlend Alfnes
R2,202 Discovery Miles 22 020 Ships in 12 - 17 working days

ERP Systems for Manufacturing Supply Chains: Applications, Configuration, and Performance provides insight into the core architecture, modules, and process support of ERP systems used in a manufacturing supply chain. This book explains the building blocks of an ERP system and how they can be used to increase performance of manufacturing supply chains. Starting with an overview of basic concepts of supply chain and ERP systems, the book delves into the core ERP modules that support manufacturing facilities and organizations. It examines each module's structure and functionality as well as the process support the module provides. Cases illustrate how the modules can be applied in manufacturing environments. Also covered is how the ERP modules can be configured to support manufacturing supply chains. Setting up an ERP system to support the supply chain within single manufacturing facility provides insight into how an ERP system is used in the smallest of manufacturing enterprises, as well as lays the foundation for ERP systems in manufacturing organizations. The book then supplies strategies for larger manufacturing enterprises and discusses how ERP systems can be used to support a complete manufacturing supply chain across different facilities and companies. The ERP systems on the market today tend to use common terminology and naming for describing specific functions and data units in the software. However, there are differences among packages. The book discusses various data and functionalities found in different ERP-software packages and uses generic and descriptive terms as often as possible to make these valid for as many ERP systems as possible. Filled with insight into ERP system's core modules and functions, this book shows how ERP systems can be applied to support a supply chain in the smallest of manufacturing organizations that only consist of a single manufacturing facility, as well as large enterprises where the manufacturing supply chain crosses multiple facilities and companies.

IoT Automation - Arrowhead Framework (Paperback): Jerker Delsing IoT Automation - Arrowhead Framework (Paperback)
Jerker Delsing
R1,495 Discovery Miles 14 950 Ships in 12 - 17 working days

This book presents an in-depth description of the Arrowhead Framework and how it fosters interoperability between IoT devices at service level, specifically addressing application. The Arrowhead Framework utilizes SOA technology and the concepts of local clouds to provide required automation capabilities such as: real time control, security, scalability, and engineering simplicity. Arrowhead Framework supports the realization of collaborative automation; it is the only IoT Framework that addresses global interoperability across multiplet SOA technologies. With these features, the Arrowhead Framework enables the design, engineering, and operation of large automation systems for a wide range of applications utilizing IoT and CPS technologies. The book provides application examples from a wide number of industrial fields e.g. airline maintenance, mining maintenance, smart production, electro-mobility, automative test, smart cities-all in response to EU societal challenges. Features Covers the design and implementation of IoT based automation systems. Industrial usage of Internet of Things and Cyber Physical Systems made feasible through Arrowhead Framework. Functions as a design cookbook for building automation systems using IoT/CPS and Arrowhead Framework. Tools, templates, code etc. described in the book will be accessible through open sources project Arrowhead Framework Wiki at forge.soa4d.org/ Written by the leading experts in the European Union and around the globe.

Principles of Inductive Near Field Communications for Internet of Things (Hardcover): Johnson I. Agbinya Principles of Inductive Near Field Communications for Internet of Things (Hardcover)
Johnson I. Agbinya
R3,111 Discovery Miles 31 110 Ships in 12 - 17 working days

Near field communication devices and the emerging field of Internet of things require efficient short range communication techniques. Classical telecommunication theory however has so far focused on radiating electromagnetic signals which is more suited to terrestrial communication systems. Over the last decade however considerable research and applications of inductive methods have emerged as innovative approaches for secure short range communications by changing the paradigm of an established model of electromagnetic communications. We have witnessed the emergence of embedded inductive medical devices, magneto-inductive waveguides, inductive pots and cooking devices, magneto-inductive sensors, wireless power transfer, inductive hearing aids and the emerging inductive point-to-point communication specifically termed near-field communication (NFC) as used in mobile phones and payment cards to name a few. While there exist a large set of distributed methods and algorithms detailing the design and performances of such applications, a significant gap is observed as a lack of detailed collection of the methods in one place which could be easily understood and used quickly by someone seeking to apply the methods. In this book this missing gap is filled with the required details and the theory of near field communication systems including both the radiating and reactive (energy coupling) near-field systems in addition to the well known far field radiation techniques. The book details the fundamental expressions and design methods which facilitate the creation of near field devices and equipment including embedded biomedical implants. The book contains recent advances in inductive communications, performance, limitations and a collection of applications. It also lays a strong foundation for the application of inductive methods for creating Internet of Things systems. * The topics discussed in the book in great details include: * Near field and far field methods * Circuit models of inductive antennas; * Inductive methods in embedded medical devices * Range and capacity extension methods including multiple-input and multiple-output inductive systems; * Coding and modulation techniques; * Narrowband and broadband methods; * Magnetic link budgets; * Crosstalk * Magnetic induction waveguide devices and a Near field Simulator in Matlab The book is a compendium and design methods for inductive near field technologies and is ideal for design personnel in the wireless communication industries as well as academic staff and master/research students in computer science, wireless sensors, telecommunications systems research, electrical engineering and Internet of things. It is a useful guide for undergraduate student to appreciate the role of inductive circuits and magnetism in telecommunications and electronic devices in general.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Age Of Agency - Rise With A.I.
Kerushan Govender Paperback R350 R280 Discovery Miles 2 800
Guide to Networking Essentials
Greg Tomsho Paperback R1,423 R1,225 Discovery Miles 12 250
CISA - Certified Information Systems…
Cannon Paperback R1,686 R1,298 Discovery Miles 12 980
Security Engineering - A Guide to…
R. Anderson Hardcover R1,358 Discovery Miles 13 580
The Gathering Cloud
J. R. Carpenter Paperback R385 Discovery Miles 3 850
Cloud Security For Dummies
T. Coombs Paperback R641 Discovery Miles 6 410
Enterprise Level Security 1 & 2
Kevin Foltz, William R. Simpson Paperback R1,421 Discovery Miles 14 210
Privacy and Legal Issues in Cloud…
Anne S.Y. Cheung, Rolf H. Weber Paperback R1,383 Discovery Miles 13 830
Introduction to Networking Basics
Patrick Ciccarelli, Christina Faulkner, … Paperback R2,320 R387 Discovery Miles 3 870
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,390 R1,198 Discovery Miles 11 980

 

Partners